Feel as though the performance of your cloud-hosted applications has become lacklustre? Here are five best practices that can help you boost end-user experiences, simplify performance management, and reduce the cost of your AWS environment.

The number of successful cyberattacks per year per company has increased by 46% over the last four years. But what really needs to be considered when exploring a solution? What questions need to be asked? Download to find out...

Dutch coppers want computer hacking powers

Leaked document reveals agenda

A DUTCH POLITICIAN wants to give police the right to access personal computers during investigations.

A leaked document seen by website nu.nl shows the Netherlands Justice Minister Ivo Opstelten complaining that police skills have not kept up with technology and considering how best to remedy this.

Machine translations don't make life easy for anyone, but as far as we can gather Opstelten thinks that the police should be allowed to install covert software on computers that would let them monitor internet users and gather evidence remotely.

The report suggests that this would apply to computers that are overseas and that typically Dutch coppers would not be authorised to access.

There is a suggestion that the powers would be used only in extreme cases, of course, and in a quote that is rather garbled in translation Opstelten seems to be saying that the idea is borne of necessity, as opposed to nosiness.

Another possibility is that the software could be used to delete content remotely. This could be used to wipe child pornography from servers for example, or to take down a botnet. µ